Oracle Java version 7 with updates 10 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

The vulnerability is due to improper security protections on functions reserved for privileged access. An unauthenticated, remote attacker could exploit this vulnerability by attempting to persuade a user to follow a link to a malicious site using misleading language or instructions. If successful, the attacker could execute arbitrary code on the system with the privileges of the user.

Functional exploit code exists publicly as part of exploit toolkits and the Metasploit framework.

Oracle has confirmed the vulnerability and software updates are available.

Warning Indicators

Oracle Java version 7 with updates 10 and prior are vulnerable. Previous versions of Oracle Java, versions 5 and 6, are not affected.

IntelliShield Analysis

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.

Functional code that exploits the vulnerability is publicly available and actively exploited in the wild. Reports indicate the Blackhole and Nuclear Pack exploit kits have incorporated this vulnerability, which could help an attacker in a successful exploit. Exploit source code has also been posted publicly, further increasing the likelihood of exploitation.

US-CERT has released a vulnerability note at the following link: VU#625617

Impact

An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code on a targeted system with the privileges of the user. If the user holds elevated privileges, the attacker could completely compromise the system.

Technical Information

The vulnerability is due to improper security protections on built-in classes in the Java Runtime Environment. An untrusted, unsigned Java applet can use the setSecurityManager() function to bypass security checks and access an elevated security context, allowing attackers to take actions outside the security protections of the sandbox environment.

An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a website that contains a malicious Java applet. When viewed, the applet could take actions in the user's browser outside the security protections of the Java Runtime Environment sandbox. As a result of bypassing the security protections, the attacker could execute arbitrary code on the system with the privileges of the user.

Safeguards

Administrators are advised to apply the appropriate updates.

Users may consider using the previous version of Java, which does not contain the vulnerability.

Users are advised to disable Java content in web browsers through the Java control panel applet.

Administrators may consider disabling Java and the Java plug-in in web browsers. Instructions for disabling Java in web browsers can be found at the following links:

Version 1, January 11, 2013, 7:43 AM: Oracle Java contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. Updates are not available.

Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the
Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service.
This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.

LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.